Feeds

Auction fraud complaints prop up declining US cybercrime reports

Buyer beware

The Essential Guide to IT Transformation

US complaints about internet fraud dropped 10 per cent last year.

The Internet Crime Complaint Center (IC3) fielded 303,809 reports of cybercrime in 2010, down from 336,655. The agency – maintained by staff from by the FBI and the National White Collar Crime Center – said the reduced figures were still the second highest in its 10 year history. Non-delivery of payment or merchandise accounted for the biggest single source of complaints (14.4 per cent), compared to 11.9 per cent in 2009.

Malware and scam emails that purported to come from the FBI itself made up the second biggest category of complaint (13.2 per cent). ID theft (9.8 per cent) also accounted for a substantial proportion of the reported problems.

Complaints about advanced fee fraud (419) scams dropped by 9.8 per cent in 2009 to 7.6 per cent in 2010, possibly (we suspect) to improvements in spam filtering.

IC3 makes no estimate of the potential value of the cyberscams reported to it but it does say that it forwarded just under half of all complaints (121,710) to various law enforcement agencies for further investigation.

The report, published on Thursday, can be downloaded here. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.